Description
Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.
d333d63bffe9994bcf0e22a744e6db792bd5284b09584c1479f150e6baf06506
134KB
211221-x1fw3seea6
55f5aca4a14f83ecbc2c12a33d058a34
61d0003be991ae56ed01200ac3ff1e96624efdce
d333d63bffe9994bcf0e22a744e6db792bd5284b09584c1479f150e6baf06506
30ea34521a10a287ec8739c47b213e7e55415640496e5d04aa76fd17023c32575362f590148a59737ec1b03b8e847722281be601a1f19370682d5deee743d7d6
Family | smokeloader |
Version | 2020 |
C2 |
http://host-data-coin-11.com/ http://file-coin-host-12.com/ http://srtuiyhuali.at/ http://fufuiloirtu.com/ http://amogohuigotuli.at/ http://novohudosovu.com/ http://brutuilionust.com/ http://bubushkalioua.com/ http://dumuilistrati.at/ http://verboliatsiaeeees.com/ |
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
Family | tofsee |
C2 |
mubrikych.top oxxyfix.xyz |
Family | redline |
Botnet | 1 |
C2 |
86.107.197.138:38133 |
Family | amadey |
Version | 2.86 |
C2 |
2.56.56.210/notAnoob/index.php |
Family | redline |
Botnet | runpe |
C2 |
142.202.242.172:7667 |
Family | raccoon |
Botnet | 10da56e7e71e97bdc1f36eb76813bbc3231de7e4 |
Attributes |
url4cnc http://194.180.174.53/capibar http://91.219.236.18/capibar http://194.180.174.41/capibar http://91.219.236.148/capibar https://t.me/capibar |
rc4.plain |
|
rc4.plain |
|
d333d63bffe9994bcf0e22a744e6db792bd5284b09584c1479f150e6baf06506
55f5aca4a14f83ecbc2c12a33d058a34
134KB
61d0003be991ae56ed01200ac3ff1e96624efdce
d333d63bffe9994bcf0e22a744e6db792bd5284b09584c1479f150e6baf06506
30ea34521a10a287ec8739c47b213e7e55415640496e5d04aa76fd17023c32575362f590148a59737ec1b03b8e847722281be601a1f19370682d5deee743d7d6
Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.
Arkei is an infostealer written in C++.
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
Simple but powerful infostealer which was very active in 2019.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
XMRig is a high performance, open source, cross platform CPU/GPU miner.
Detects executables packed with VMProtect commercial packer.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.